Merge branch 'HEAD' of master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6
[linux-2.6] / drivers / usb / core / devio.c
1 /*****************************************************************************/
2
3 /*
4  *      devio.c  --  User space communication with USB devices.
5  *
6  *      Copyright (C) 1999-2000  Thomas Sailer (sailer@ife.ee.ethz.ch)
7  *
8  *      This program is free software; you can redistribute it and/or modify
9  *      it under the terms of the GNU General Public License as published by
10  *      the Free Software Foundation; either version 2 of the License, or
11  *      (at your option) any later version.
12  *
13  *      This program is distributed in the hope that it will be useful,
14  *      but WITHOUT ANY WARRANTY; without even the implied warranty of
15  *      MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
16  *      GNU General Public License for more details.
17  *
18  *      You should have received a copy of the GNU General Public License
19  *      along with this program; if not, write to the Free Software
20  *      Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
21  *
22  *  $Id: devio.c,v 1.7 2000/02/01 17:28:48 fliegl Exp $
23  *
24  *  This file implements the usbfs/x/y files, where
25  *  x is the bus number and y the device number.
26  *
27  *  It allows user space programs/"drivers" to communicate directly
28  *  with USB devices without intervening kernel driver.
29  *
30  *  Revision history
31  *    22.12.1999   0.1   Initial release (split from proc_usb.c)
32  *    04.01.2000   0.2   Turned into its own filesystem
33  *    30.09.2005   0.3   Fix user-triggerable oops in async URB delivery
34  *                       (CAN-2005-3055)
35  */
36
37 /*****************************************************************************/
38
39 #include <linux/fs.h>
40 #include <linux/mm.h>
41 #include <linux/slab.h>
42 #include <linux/smp_lock.h>
43 #include <linux/signal.h>
44 #include <linux/poll.h>
45 #include <linux/module.h>
46 #include <linux/usb.h>
47 #include <linux/usbdevice_fs.h>
48 #include <linux/cdev.h>
49 #include <linux/notifier.h>
50 #include <linux/security.h>
51 #include <asm/uaccess.h>
52 #include <asm/byteorder.h>
53 #include <linux/moduleparam.h>
54
55 #include "hcd.h"        /* for usbcore internals */
56 #include "usb.h"
57
58 #define USB_MAXBUS                      64
59 #define USB_DEVICE_MAX                  USB_MAXBUS * 128
60 static struct class *usb_device_class;
61
62 /* Mutual exclusion for removal, open, and release */
63 DEFINE_MUTEX(usbfs_mutex);
64
65 struct async {
66         struct list_head asynclist;
67         struct dev_state *ps;
68         struct pid *pid;
69         uid_t uid, euid;
70         unsigned int signr;
71         unsigned int ifnum;
72         void __user *userbuffer;
73         void __user *userurb;
74         struct urb *urb;
75         u32 secid;
76 };
77
78 static int usbfs_snoop = 0;
79 module_param (usbfs_snoop, bool, S_IRUGO | S_IWUSR);
80 MODULE_PARM_DESC (usbfs_snoop, "true to log all usbfs traffic");
81
82 #define snoop(dev, format, arg...)                              \
83         do {                                                    \
84                 if (usbfs_snoop)                                \
85                         dev_info( dev , format , ## arg);       \
86         } while (0)
87
88 #define USB_DEVICE_DEV          MKDEV(USB_DEVICE_MAJOR, 0)
89
90
91 #define MAX_USBFS_BUFFER_SIZE   16384
92
93 static inline int connected (struct dev_state *ps)
94 {
95         return (!list_empty(&ps->list) &&
96                         ps->dev->state != USB_STATE_NOTATTACHED);
97 }
98
99 static loff_t usbdev_lseek(struct file *file, loff_t offset, int orig)
100 {
101         loff_t ret;
102
103         lock_kernel();
104
105         switch (orig) {
106         case 0:
107                 file->f_pos = offset;
108                 ret = file->f_pos;
109                 break;
110         case 1:
111                 file->f_pos += offset;
112                 ret = file->f_pos;
113                 break;
114         case 2:
115         default:
116                 ret = -EINVAL;
117         }
118
119         unlock_kernel();
120         return ret;
121 }
122
123 static ssize_t usbdev_read(struct file *file, char __user *buf, size_t nbytes, loff_t *ppos)
124 {
125         struct dev_state *ps = file->private_data;
126         struct usb_device *dev = ps->dev;
127         ssize_t ret = 0;
128         unsigned len;
129         loff_t pos;
130         int i;
131
132         pos = *ppos;
133         usb_lock_device(dev);
134         if (!connected(ps)) {
135                 ret = -ENODEV;
136                 goto err;
137         } else if (pos < 0) {
138                 ret = -EINVAL;
139                 goto err;
140         }
141
142         if (pos < sizeof(struct usb_device_descriptor)) {
143                 struct usb_device_descriptor temp_desc ; /* 18 bytes - fits on the stack */
144
145                 memcpy(&temp_desc, &dev->descriptor, sizeof(dev->descriptor));
146                 le16_to_cpus(&temp_desc.bcdUSB);
147                 le16_to_cpus(&temp_desc.idVendor);
148                 le16_to_cpus(&temp_desc.idProduct);
149                 le16_to_cpus(&temp_desc.bcdDevice);
150
151                 len = sizeof(struct usb_device_descriptor) - pos;
152                 if (len > nbytes)
153                         len = nbytes;
154                 if (copy_to_user(buf, ((char *)&temp_desc) + pos, len)) {
155                         ret = -EFAULT;
156                         goto err;
157                 }
158
159                 *ppos += len;
160                 buf += len;
161                 nbytes -= len;
162                 ret += len;
163         }
164
165         pos = sizeof(struct usb_device_descriptor);
166         for (i = 0; nbytes && i < dev->descriptor.bNumConfigurations; i++) {
167                 struct usb_config_descriptor *config =
168                         (struct usb_config_descriptor *)dev->rawdescriptors[i];
169                 unsigned int length = le16_to_cpu(config->wTotalLength);
170
171                 if (*ppos < pos + length) {
172
173                         /* The descriptor may claim to be longer than it
174                          * really is.  Here is the actual allocated length. */
175                         unsigned alloclen =
176                                 le16_to_cpu(dev->config[i].desc.wTotalLength);
177
178                         len = length - (*ppos - pos);
179                         if (len > nbytes)
180                                 len = nbytes;
181
182                         /* Simply don't write (skip over) unallocated parts */
183                         if (alloclen > (*ppos - pos)) {
184                                 alloclen -= (*ppos - pos);
185                                 if (copy_to_user(buf,
186                                     dev->rawdescriptors[i] + (*ppos - pos),
187                                     min(len, alloclen))) {
188                                         ret = -EFAULT;
189                                         goto err;
190                                 }
191                         }
192
193                         *ppos += len;
194                         buf += len;
195                         nbytes -= len;
196                         ret += len;
197                 }
198
199                 pos += length;
200         }
201
202 err:
203         usb_unlock_device(dev);
204         return ret;
205 }
206
207 /*
208  * async list handling
209  */
210
211 static struct async *alloc_async(unsigned int numisoframes)
212 {
213         unsigned int assize = sizeof(struct async) + numisoframes * sizeof(struct usb_iso_packet_descriptor);
214         struct async *as = kzalloc(assize, GFP_KERNEL);
215
216         if (!as)
217                 return NULL;
218         as->urb = usb_alloc_urb(numisoframes, GFP_KERNEL);
219         if (!as->urb) {
220                 kfree(as);
221                 return NULL;
222         }
223         return as;
224 }
225
226 static void free_async(struct async *as)
227 {
228         put_pid(as->pid);
229         kfree(as->urb->transfer_buffer);
230         kfree(as->urb->setup_packet);
231         usb_free_urb(as->urb);
232         kfree(as);
233 }
234
235 static inline void async_newpending(struct async *as)
236 {
237         struct dev_state *ps = as->ps;
238         unsigned long flags;
239         
240         spin_lock_irqsave(&ps->lock, flags);
241         list_add_tail(&as->asynclist, &ps->async_pending);
242         spin_unlock_irqrestore(&ps->lock, flags);
243 }
244
245 static inline void async_removepending(struct async *as)
246 {
247         struct dev_state *ps = as->ps;
248         unsigned long flags;
249         
250         spin_lock_irqsave(&ps->lock, flags);
251         list_del_init(&as->asynclist);
252         spin_unlock_irqrestore(&ps->lock, flags);
253 }
254
255 static inline struct async *async_getcompleted(struct dev_state *ps)
256 {
257         unsigned long flags;
258         struct async *as = NULL;
259
260         spin_lock_irqsave(&ps->lock, flags);
261         if (!list_empty(&ps->async_completed)) {
262                 as = list_entry(ps->async_completed.next, struct async, asynclist);
263                 list_del_init(&as->asynclist);
264         }
265         spin_unlock_irqrestore(&ps->lock, flags);
266         return as;
267 }
268
269 static inline struct async *async_getpending(struct dev_state *ps, void __user *userurb)
270 {
271         unsigned long flags;
272         struct async *as;
273
274         spin_lock_irqsave(&ps->lock, flags);
275         list_for_each_entry(as, &ps->async_pending, asynclist)
276                 if (as->userurb == userurb) {
277                         list_del_init(&as->asynclist);
278                         spin_unlock_irqrestore(&ps->lock, flags);
279                         return as;
280                 }
281         spin_unlock_irqrestore(&ps->lock, flags);
282         return NULL;
283 }
284
285 static void snoop_urb(struct urb *urb, void __user *userurb)
286 {
287         int j;
288         unsigned char *data = urb->transfer_buffer;
289
290         if (!usbfs_snoop)
291                 return;
292
293         if (urb->pipe & USB_DIR_IN)
294                 dev_info(&urb->dev->dev, "direction=IN\n");
295         else
296                 dev_info(&urb->dev->dev, "direction=OUT\n");
297         dev_info(&urb->dev->dev, "userurb=%p\n", userurb);
298         dev_info(&urb->dev->dev, "transfer_buffer_length=%d\n",
299                  urb->transfer_buffer_length);
300         dev_info(&urb->dev->dev, "actual_length=%d\n", urb->actual_length);
301         dev_info(&urb->dev->dev, "data: ");
302         for (j = 0; j < urb->transfer_buffer_length; ++j)
303                 printk ("%02x ", data[j]);
304         printk("\n");
305 }
306
307 static void async_completed(struct urb *urb)
308 {
309         struct async *as = urb->context;
310         struct dev_state *ps = as->ps;
311         struct siginfo sinfo;
312
313         spin_lock(&ps->lock);
314         list_move_tail(&as->asynclist, &ps->async_completed);
315         spin_unlock(&ps->lock);
316         if (as->signr) {
317                 sinfo.si_signo = as->signr;
318                 sinfo.si_errno = as->urb->status;
319                 sinfo.si_code = SI_ASYNCIO;
320                 sinfo.si_addr = as->userurb;
321                 kill_pid_info_as_uid(as->signr, &sinfo, as->pid, as->uid,
322                                       as->euid, as->secid);
323         }
324         snoop(&urb->dev->dev, "urb complete\n");
325         snoop_urb(urb, as->userurb);
326         wake_up(&ps->wait);
327 }
328
329 static void destroy_async (struct dev_state *ps, struct list_head *list)
330 {
331         struct async *as;
332         unsigned long flags;
333
334         spin_lock_irqsave(&ps->lock, flags);
335         while (!list_empty(list)) {
336                 as = list_entry(list->next, struct async, asynclist);
337                 list_del_init(&as->asynclist);
338
339                 /* drop the spinlock so the completion handler can run */
340                 spin_unlock_irqrestore(&ps->lock, flags);
341                 usb_kill_urb(as->urb);
342                 spin_lock_irqsave(&ps->lock, flags);
343         }
344         spin_unlock_irqrestore(&ps->lock, flags);
345         as = async_getcompleted(ps);
346         while (as) {
347                 free_async(as);
348                 as = async_getcompleted(ps);
349         }
350 }
351
352 static void destroy_async_on_interface (struct dev_state *ps, unsigned int ifnum)
353 {
354         struct list_head *p, *q, hitlist;
355         unsigned long flags;
356
357         INIT_LIST_HEAD(&hitlist);
358         spin_lock_irqsave(&ps->lock, flags);
359         list_for_each_safe(p, q, &ps->async_pending)
360                 if (ifnum == list_entry(p, struct async, asynclist)->ifnum)
361                         list_move_tail(p, &hitlist);
362         spin_unlock_irqrestore(&ps->lock, flags);
363         destroy_async(ps, &hitlist);
364 }
365
366 static inline void destroy_all_async(struct dev_state *ps)
367 {
368                 destroy_async(ps, &ps->async_pending);
369 }
370
371 /*
372  * interface claims are made only at the request of user level code,
373  * which can also release them (explicitly or by closing files).
374  * they're also undone when devices disconnect.
375  */
376
377 static int driver_probe (struct usb_interface *intf,
378                          const struct usb_device_id *id)
379 {
380         return -ENODEV;
381 }
382
383 static void driver_disconnect(struct usb_interface *intf)
384 {
385         struct dev_state *ps = usb_get_intfdata (intf);
386         unsigned int ifnum = intf->altsetting->desc.bInterfaceNumber;
387
388         if (!ps)
389                 return;
390
391         /* NOTE:  this relies on usbcore having canceled and completed
392          * all pending I/O requests; 2.6 does that.
393          */
394
395         if (likely(ifnum < 8*sizeof(ps->ifclaimed)))
396                 clear_bit(ifnum, &ps->ifclaimed);
397         else
398                 warn("interface number %u out of range", ifnum);
399
400         usb_set_intfdata (intf, NULL);
401
402         /* force async requests to complete */
403         destroy_async_on_interface(ps, ifnum);
404 }
405
406 struct usb_driver usbfs_driver = {
407         .name =         "usbfs",
408         .probe =        driver_probe,
409         .disconnect =   driver_disconnect,
410 };
411
412 static int claimintf(struct dev_state *ps, unsigned int ifnum)
413 {
414         struct usb_device *dev = ps->dev;
415         struct usb_interface *intf;
416         int err;
417
418         if (ifnum >= 8*sizeof(ps->ifclaimed))
419                 return -EINVAL;
420         /* already claimed */
421         if (test_bit(ifnum, &ps->ifclaimed))
422                 return 0;
423
424         /* lock against other changes to driver bindings */
425         down_write(&usb_bus_type.subsys.rwsem);
426         intf = usb_ifnum_to_if(dev, ifnum);
427         if (!intf)
428                 err = -ENOENT;
429         else
430                 err = usb_driver_claim_interface(&usbfs_driver, intf, ps);
431         up_write(&usb_bus_type.subsys.rwsem);
432         if (err == 0)
433                 set_bit(ifnum, &ps->ifclaimed);
434         return err;
435 }
436
437 static int releaseintf(struct dev_state *ps, unsigned int ifnum)
438 {
439         struct usb_device *dev;
440         struct usb_interface *intf;
441         int err;
442
443         err = -EINVAL;
444         if (ifnum >= 8*sizeof(ps->ifclaimed))
445                 return err;
446         dev = ps->dev;
447         /* lock against other changes to driver bindings */
448         down_write(&usb_bus_type.subsys.rwsem);
449         intf = usb_ifnum_to_if(dev, ifnum);
450         if (!intf)
451                 err = -ENOENT;
452         else if (test_and_clear_bit(ifnum, &ps->ifclaimed)) {
453                 usb_driver_release_interface(&usbfs_driver, intf);
454                 err = 0;
455         }
456         up_write(&usb_bus_type.subsys.rwsem);
457         return err;
458 }
459
460 static int checkintf(struct dev_state *ps, unsigned int ifnum)
461 {
462         if (ps->dev->state != USB_STATE_CONFIGURED)
463                 return -EHOSTUNREACH;
464         if (ifnum >= 8*sizeof(ps->ifclaimed))
465                 return -EINVAL;
466         if (test_bit(ifnum, &ps->ifclaimed))
467                 return 0;
468         /* if not yet claimed, claim it for the driver */
469         dev_warn(&ps->dev->dev, "usbfs: process %d (%s) did not claim interface %u before use\n",
470                current->pid, current->comm, ifnum);
471         return claimintf(ps, ifnum);
472 }
473
474 static int findintfep(struct usb_device *dev, unsigned int ep)
475 {
476         unsigned int i, j, e;
477         struct usb_interface *intf;
478         struct usb_host_interface *alts;
479         struct usb_endpoint_descriptor *endpt;
480
481         if (ep & ~(USB_DIR_IN|0xf))
482                 return -EINVAL;
483         if (!dev->actconfig)
484                 return -ESRCH;
485         for (i = 0; i < dev->actconfig->desc.bNumInterfaces; i++) {
486                 intf = dev->actconfig->interface[i];
487                 for (j = 0; j < intf->num_altsetting; j++) {
488                         alts = &intf->altsetting[j];
489                         for (e = 0; e < alts->desc.bNumEndpoints; e++) {
490                                 endpt = &alts->endpoint[e].desc;
491                                 if (endpt->bEndpointAddress == ep)
492                                         return alts->desc.bInterfaceNumber;
493                         }
494                 }
495         }
496         return -ENOENT; 
497 }
498
499 static int check_ctrlrecip(struct dev_state *ps, unsigned int requesttype, unsigned int index)
500 {
501         int ret = 0;
502
503         if (ps->dev->state != USB_STATE_ADDRESS
504          && ps->dev->state != USB_STATE_CONFIGURED)
505                 return -EHOSTUNREACH;
506         if (USB_TYPE_VENDOR == (USB_TYPE_MASK & requesttype))
507                 return 0;
508
509         index &= 0xff;
510         switch (requesttype & USB_RECIP_MASK) {
511         case USB_RECIP_ENDPOINT:
512                 if ((ret = findintfep(ps->dev, index)) >= 0)
513                         ret = checkintf(ps, ret);
514                 break;
515
516         case USB_RECIP_INTERFACE:
517                 ret = checkintf(ps, index);
518                 break;
519         }
520         return ret;
521 }
522
523 static struct usb_device *usbdev_lookup_minor(int minor)
524 {
525         struct device *device;
526         struct usb_device *udev = NULL;
527
528         down(&usb_device_class->sem);
529         list_for_each_entry(device, &usb_device_class->devices, node) {
530                 if (device->devt == MKDEV(USB_DEVICE_MAJOR, minor)) {
531                         udev = device->platform_data;
532                         break;
533                 }
534         }
535         up(&usb_device_class->sem);
536
537         return udev;
538 };
539
540 /*
541  * file operations
542  */
543 static int usbdev_open(struct inode *inode, struct file *file)
544 {
545         struct usb_device *dev = NULL;
546         struct dev_state *ps;
547         int ret;
548
549         /* Protect against simultaneous removal or release */
550         mutex_lock(&usbfs_mutex);
551
552         ret = -ENOMEM;
553         if (!(ps = kmalloc(sizeof(struct dev_state), GFP_KERNEL)))
554                 goto out;
555
556         ret = -ENOENT;
557         /* check if we are called from a real node or usbfs */
558         if (imajor(inode) == USB_DEVICE_MAJOR)
559                 dev = usbdev_lookup_minor(iminor(inode));
560         if (!dev)
561                 dev = inode->i_private;
562         if (!dev)
563                 goto out;
564         ret = usb_autoresume_device(dev);
565         if (ret)
566                 goto out;
567
568         usb_get_dev(dev);
569         ret = 0;
570         ps->dev = dev;
571         ps->file = file;
572         spin_lock_init(&ps->lock);
573         INIT_LIST_HEAD(&ps->list);
574         INIT_LIST_HEAD(&ps->async_pending);
575         INIT_LIST_HEAD(&ps->async_completed);
576         init_waitqueue_head(&ps->wait);
577         ps->discsignr = 0;
578         ps->disc_pid = get_pid(task_pid(current));
579         ps->disc_uid = current->uid;
580         ps->disc_euid = current->euid;
581         ps->disccontext = NULL;
582         ps->ifclaimed = 0;
583         security_task_getsecid(current, &ps->secid);
584         wmb();
585         list_add_tail(&ps->list, &dev->filelist);
586         file->private_data = ps;
587  out:
588         if (ret)
589                 kfree(ps);
590         mutex_unlock(&usbfs_mutex);
591         return ret;
592 }
593
594 static int usbdev_release(struct inode *inode, struct file *file)
595 {
596         struct dev_state *ps = file->private_data;
597         struct usb_device *dev = ps->dev;
598         unsigned int ifnum;
599
600         usb_lock_device(dev);
601
602         /* Protect against simultaneous open */
603         mutex_lock(&usbfs_mutex);
604         list_del_init(&ps->list);
605         mutex_unlock(&usbfs_mutex);
606
607         for (ifnum = 0; ps->ifclaimed && ifnum < 8*sizeof(ps->ifclaimed);
608                         ifnum++) {
609                 if (test_bit(ifnum, &ps->ifclaimed))
610                         releaseintf(ps, ifnum);
611         }
612         destroy_all_async(ps);
613         usb_autosuspend_device(dev);
614         usb_unlock_device(dev);
615         usb_put_dev(dev);
616         put_pid(ps->disc_pid);
617         kfree(ps);
618         return 0;
619 }
620
621 static int proc_control(struct dev_state *ps, void __user *arg)
622 {
623         struct usb_device *dev = ps->dev;
624         struct usbdevfs_ctrltransfer ctrl;
625         unsigned int tmo;
626         unsigned char *tbuf;
627         int i, j, ret;
628
629         if (copy_from_user(&ctrl, arg, sizeof(ctrl)))
630                 return -EFAULT;
631         if ((ret = check_ctrlrecip(ps, ctrl.bRequestType, ctrl.wIndex)))
632                 return ret;
633         if (ctrl.wLength > PAGE_SIZE)
634                 return -EINVAL;
635         if (!(tbuf = (unsigned char *)__get_free_page(GFP_KERNEL)))
636                 return -ENOMEM;
637         tmo = ctrl.timeout;
638         if (ctrl.bRequestType & 0x80) {
639                 if (ctrl.wLength && !access_ok(VERIFY_WRITE, ctrl.data, ctrl.wLength)) {
640                         free_page((unsigned long)tbuf);
641                         return -EINVAL;
642                 }
643                 snoop(&dev->dev, "control read: bRequest=%02x "
644                                 "bRrequestType=%02x wValue=%04x "
645                                 "wIndex=%04x wLength=%04x\n",
646                         ctrl.bRequest, ctrl.bRequestType, ctrl.wValue,
647                                 ctrl.wIndex, ctrl.wLength);
648
649                 usb_unlock_device(dev);
650                 i = usb_control_msg(dev, usb_rcvctrlpipe(dev, 0), ctrl.bRequest, ctrl.bRequestType,
651                                        ctrl.wValue, ctrl.wIndex, tbuf, ctrl.wLength, tmo);
652                 usb_lock_device(dev);
653                 if ((i > 0) && ctrl.wLength) {
654                         if (usbfs_snoop) {
655                                 dev_info(&dev->dev, "control read: data ");
656                                 for (j = 0; j < i; ++j)
657                                         printk("%02x ", (unsigned char)(tbuf)[j]);
658                                 printk("\n");
659                         }
660                         if (copy_to_user(ctrl.data, tbuf, i)) {
661                                 free_page((unsigned long)tbuf);
662                                 return -EFAULT;
663                         }
664                 }
665         } else {
666                 if (ctrl.wLength) {
667                         if (copy_from_user(tbuf, ctrl.data, ctrl.wLength)) {
668                                 free_page((unsigned long)tbuf);
669                                 return -EFAULT;
670                         }
671                 }
672                 snoop(&dev->dev, "control write: bRequest=%02x "
673                                 "bRrequestType=%02x wValue=%04x "
674                                 "wIndex=%04x wLength=%04x\n",
675                         ctrl.bRequest, ctrl.bRequestType, ctrl.wValue,
676                                 ctrl.wIndex, ctrl.wLength);
677                 if (usbfs_snoop) {
678                         dev_info(&dev->dev, "control write: data: ");
679                         for (j = 0; j < ctrl.wLength; ++j)
680                                 printk("%02x ", (unsigned char)(tbuf)[j]);
681                         printk("\n");
682                 }
683                 usb_unlock_device(dev);
684                 i = usb_control_msg(dev, usb_sndctrlpipe(dev, 0), ctrl.bRequest, ctrl.bRequestType,
685                                        ctrl.wValue, ctrl.wIndex, tbuf, ctrl.wLength, tmo);
686                 usb_lock_device(dev);
687         }
688         free_page((unsigned long)tbuf);
689         if (i<0 && i != -EPIPE) {
690                 dev_printk(KERN_DEBUG, &dev->dev, "usbfs: USBDEVFS_CONTROL "
691                            "failed cmd %s rqt %u rq %u len %u ret %d\n",
692                            current->comm, ctrl.bRequestType, ctrl.bRequest,
693                            ctrl.wLength, i);
694         }
695         return i;
696 }
697
698 static int proc_bulk(struct dev_state *ps, void __user *arg)
699 {
700         struct usb_device *dev = ps->dev;
701         struct usbdevfs_bulktransfer bulk;
702         unsigned int tmo, len1, pipe;
703         int len2;
704         unsigned char *tbuf;
705         int i, j, ret;
706
707         if (copy_from_user(&bulk, arg, sizeof(bulk)))
708                 return -EFAULT;
709         if ((ret = findintfep(ps->dev, bulk.ep)) < 0)
710                 return ret;
711         if ((ret = checkintf(ps, ret)))
712                 return ret;
713         if (bulk.ep & USB_DIR_IN)
714                 pipe = usb_rcvbulkpipe(dev, bulk.ep & 0x7f);
715         else
716                 pipe = usb_sndbulkpipe(dev, bulk.ep & 0x7f);
717         if (!usb_maxpacket(dev, pipe, !(bulk.ep & USB_DIR_IN)))
718                 return -EINVAL;
719         len1 = bulk.len;
720         if (len1 > MAX_USBFS_BUFFER_SIZE)
721                 return -EINVAL;
722         if (!(tbuf = kmalloc(len1, GFP_KERNEL)))
723                 return -ENOMEM;
724         tmo = bulk.timeout;
725         if (bulk.ep & 0x80) {
726                 if (len1 && !access_ok(VERIFY_WRITE, bulk.data, len1)) {
727                         kfree(tbuf);
728                         return -EINVAL;
729                 }
730                 snoop(&dev->dev, "bulk read: len=0x%02x timeout=%04d\n",
731                         bulk.len, bulk.timeout);
732                 usb_unlock_device(dev);
733                 i = usb_bulk_msg(dev, pipe, tbuf, len1, &len2, tmo);
734                 usb_lock_device(dev);
735                 if (!i && len2) {
736                         if (usbfs_snoop) {
737                                 dev_info(&dev->dev, "bulk read: data ");
738                                 for (j = 0; j < len2; ++j)
739                                         printk("%02x ", (unsigned char)(tbuf)[j]);
740                                 printk("\n");
741                         }
742                         if (copy_to_user(bulk.data, tbuf, len2)) {
743                                 kfree(tbuf);
744                                 return -EFAULT;
745                         }
746                 }
747         } else {
748                 if (len1) {
749                         if (copy_from_user(tbuf, bulk.data, len1)) {
750                                 kfree(tbuf);
751                                 return -EFAULT;
752                         }
753                 }
754                 snoop(&dev->dev, "bulk write: len=0x%02x timeout=%04d\n",
755                         bulk.len, bulk.timeout);
756                 if (usbfs_snoop) {
757                         dev_info(&dev->dev, "bulk write: data: ");
758                         for (j = 0; j < len1; ++j)
759                                 printk("%02x ", (unsigned char)(tbuf)[j]);
760                         printk("\n");
761                 }
762                 usb_unlock_device(dev);
763                 i = usb_bulk_msg(dev, pipe, tbuf, len1, &len2, tmo);
764                 usb_lock_device(dev);
765         }
766         kfree(tbuf);
767         if (i < 0)
768                 return i;
769         return len2;
770 }
771
772 static int proc_resetep(struct dev_state *ps, void __user *arg)
773 {
774         unsigned int ep;
775         int ret;
776
777         if (get_user(ep, (unsigned int __user *)arg))
778                 return -EFAULT;
779         if ((ret = findintfep(ps->dev, ep)) < 0)
780                 return ret;
781         if ((ret = checkintf(ps, ret)))
782                 return ret;
783         usb_settoggle(ps->dev, ep & 0xf, !(ep & USB_DIR_IN), 0);
784         return 0;
785 }
786
787 static int proc_clearhalt(struct dev_state *ps, void __user *arg)
788 {
789         unsigned int ep;
790         int pipe;
791         int ret;
792
793         if (get_user(ep, (unsigned int __user *)arg))
794                 return -EFAULT;
795         if ((ret = findintfep(ps->dev, ep)) < 0)
796                 return ret;
797         if ((ret = checkintf(ps, ret)))
798                 return ret;
799         if (ep & USB_DIR_IN)
800                 pipe = usb_rcvbulkpipe(ps->dev, ep & 0x7f);
801         else
802                 pipe = usb_sndbulkpipe(ps->dev, ep & 0x7f);
803
804         return usb_clear_halt(ps->dev, pipe);
805 }
806                 
807
808 static int proc_getdriver(struct dev_state *ps, void __user *arg)
809 {
810         struct usbdevfs_getdriver gd;
811         struct usb_interface *intf;
812         int ret;
813
814         if (copy_from_user(&gd, arg, sizeof(gd)))
815                 return -EFAULT;
816         down_read(&usb_bus_type.subsys.rwsem);
817         intf = usb_ifnum_to_if(ps->dev, gd.interface);
818         if (!intf || !intf->dev.driver)
819                 ret = -ENODATA;
820         else {
821                 strncpy(gd.driver, intf->dev.driver->name,
822                                 sizeof(gd.driver));
823                 ret = (copy_to_user(arg, &gd, sizeof(gd)) ? -EFAULT : 0);
824         }
825         up_read(&usb_bus_type.subsys.rwsem);
826         return ret;
827 }
828
829 static int proc_connectinfo(struct dev_state *ps, void __user *arg)
830 {
831         struct usbdevfs_connectinfo ci;
832
833         ci.devnum = ps->dev->devnum;
834         ci.slow = ps->dev->speed == USB_SPEED_LOW;
835         if (copy_to_user(arg, &ci, sizeof(ci)))
836                 return -EFAULT;
837         return 0;
838 }
839
840 static int proc_resetdevice(struct dev_state *ps)
841 {
842         return usb_reset_composite_device(ps->dev, NULL);
843 }
844
845 static int proc_setintf(struct dev_state *ps, void __user *arg)
846 {
847         struct usbdevfs_setinterface setintf;
848         int ret;
849
850         if (copy_from_user(&setintf, arg, sizeof(setintf)))
851                 return -EFAULT;
852         if ((ret = checkintf(ps, setintf.interface)))
853                 return ret;
854         return usb_set_interface(ps->dev, setintf.interface,
855                         setintf.altsetting);
856 }
857
858 static int proc_setconfig(struct dev_state *ps, void __user *arg)
859 {
860         unsigned int u;
861         int status = 0;
862         struct usb_host_config *actconfig;
863
864         if (get_user(u, (unsigned int __user *)arg))
865                 return -EFAULT;
866
867         actconfig = ps->dev->actconfig;
868  
869         /* Don't touch the device if any interfaces are claimed.
870          * It could interfere with other drivers' operations, and if
871          * an interface is claimed by usbfs it could easily deadlock.
872          */
873         if (actconfig) {
874                 int i;
875  
876                 for (i = 0; i < actconfig->desc.bNumInterfaces; ++i) {
877                         if (usb_interface_claimed(actconfig->interface[i])) {
878                                 dev_warn (&ps->dev->dev,
879                                         "usbfs: interface %d claimed by %s "
880                                         "while '%s' sets config #%d\n",
881                                         actconfig->interface[i]
882                                                 ->cur_altsetting
883                                                 ->desc.bInterfaceNumber,
884                                         actconfig->interface[i]
885                                                 ->dev.driver->name,
886                                         current->comm, u);
887                                 status = -EBUSY;
888                                 break;
889                         }
890                 }
891         }
892
893         /* SET_CONFIGURATION is often abused as a "cheap" driver reset,
894          * so avoid usb_set_configuration()'s kick to sysfs
895          */
896         if (status == 0) {
897                 if (actconfig && actconfig->desc.bConfigurationValue == u)
898                         status = usb_reset_configuration(ps->dev);
899                 else
900                         status = usb_set_configuration(ps->dev, u);
901         }
902
903         return status;
904 }
905
906 static int proc_do_submiturb(struct dev_state *ps, struct usbdevfs_urb *uurb,
907                              struct usbdevfs_iso_packet_desc __user *iso_frame_desc,
908                              void __user *arg)
909 {
910         struct usbdevfs_iso_packet_desc *isopkt = NULL;
911         struct usb_host_endpoint *ep;
912         struct async *as;
913         struct usb_ctrlrequest *dr = NULL;
914         unsigned int u, totlen, isofrmlen;
915         int ret, interval = 0, ifnum = -1;
916
917         if (uurb->flags & ~(USBDEVFS_URB_ISO_ASAP|USBDEVFS_URB_SHORT_NOT_OK|
918                            URB_NO_FSBR|URB_ZERO_PACKET))
919                 return -EINVAL;
920         if (!uurb->buffer)
921                 return -EINVAL;
922         if (uurb->signr != 0 && (uurb->signr < SIGRTMIN || uurb->signr > SIGRTMAX))
923                 return -EINVAL;
924         if (!(uurb->type == USBDEVFS_URB_TYPE_CONTROL && (uurb->endpoint & ~USB_ENDPOINT_DIR_MASK) == 0)) {
925                 if ((ifnum = findintfep(ps->dev, uurb->endpoint)) < 0)
926                         return ifnum;
927                 if ((ret = checkintf(ps, ifnum)))
928                         return ret;
929         }
930         if ((uurb->endpoint & USB_ENDPOINT_DIR_MASK) != 0)
931                 ep = ps->dev->ep_in [uurb->endpoint & USB_ENDPOINT_NUMBER_MASK];
932         else
933                 ep = ps->dev->ep_out [uurb->endpoint & USB_ENDPOINT_NUMBER_MASK];
934         if (!ep)
935                 return -ENOENT;
936         switch(uurb->type) {
937         case USBDEVFS_URB_TYPE_CONTROL:
938                 if ((ep->desc.bmAttributes & USB_ENDPOINT_XFERTYPE_MASK)
939                                 != USB_ENDPOINT_XFER_CONTROL)
940                         return -EINVAL;
941                 /* min 8 byte setup packet, max 8 byte setup plus an arbitrary data stage */
942                 if (uurb->buffer_length < 8 || uurb->buffer_length > (8 + MAX_USBFS_BUFFER_SIZE))
943                         return -EINVAL;
944                 if (!(dr = kmalloc(sizeof(struct usb_ctrlrequest), GFP_KERNEL)))
945                         return -ENOMEM;
946                 if (copy_from_user(dr, uurb->buffer, 8)) {
947                         kfree(dr);
948                         return -EFAULT;
949                 }
950                 if (uurb->buffer_length < (le16_to_cpup(&dr->wLength) + 8)) {
951                         kfree(dr);
952                         return -EINVAL;
953                 }
954                 if ((ret = check_ctrlrecip(ps, dr->bRequestType, le16_to_cpup(&dr->wIndex)))) {
955                         kfree(dr);
956                         return ret;
957                 }
958                 uurb->endpoint = (uurb->endpoint & ~USB_ENDPOINT_DIR_MASK) | (dr->bRequestType & USB_ENDPOINT_DIR_MASK);
959                 uurb->number_of_packets = 0;
960                 uurb->buffer_length = le16_to_cpup(&dr->wLength);
961                 uurb->buffer += 8;
962                 if (!access_ok((uurb->endpoint & USB_DIR_IN) ?  VERIFY_WRITE : VERIFY_READ, uurb->buffer, uurb->buffer_length)) {
963                         kfree(dr);
964                         return -EFAULT;
965                 }
966                 snoop(&ps->dev->dev, "control urb: bRequest=%02x "
967                         "bRrequestType=%02x wValue=%04x "
968                         "wIndex=%04x wLength=%04x\n",
969                         dr->bRequest, dr->bRequestType, dr->wValue,
970                         dr->wIndex, dr->wLength);
971                 break;
972
973         case USBDEVFS_URB_TYPE_BULK:
974                 switch (ep->desc.bmAttributes & USB_ENDPOINT_XFERTYPE_MASK) {
975                 case USB_ENDPOINT_XFER_CONTROL:
976                 case USB_ENDPOINT_XFER_ISOC:
977                         return -EINVAL;
978                 /* allow single-shot interrupt transfers, at bogus rates */
979                 }
980                 uurb->number_of_packets = 0;
981                 if (uurb->buffer_length > MAX_USBFS_BUFFER_SIZE)
982                         return -EINVAL;
983                 if (!access_ok((uurb->endpoint & USB_DIR_IN) ? VERIFY_WRITE : VERIFY_READ, uurb->buffer, uurb->buffer_length))
984                         return -EFAULT;
985                 snoop(&ps->dev->dev, "bulk urb\n");
986                 break;
987
988         case USBDEVFS_URB_TYPE_ISO:
989                 /* arbitrary limit */
990                 if (uurb->number_of_packets < 1 || uurb->number_of_packets > 128)
991                         return -EINVAL;
992                 if ((ep->desc.bmAttributes & USB_ENDPOINT_XFERTYPE_MASK)
993                                 != USB_ENDPOINT_XFER_ISOC)
994                         return -EINVAL;
995                 interval = 1 << min (15, ep->desc.bInterval - 1);
996                 isofrmlen = sizeof(struct usbdevfs_iso_packet_desc) * uurb->number_of_packets;
997                 if (!(isopkt = kmalloc(isofrmlen, GFP_KERNEL)))
998                         return -ENOMEM;
999                 if (copy_from_user(isopkt, iso_frame_desc, isofrmlen)) {
1000                         kfree(isopkt);
1001                         return -EFAULT;
1002                 }
1003                 for (totlen = u = 0; u < uurb->number_of_packets; u++) {
1004                         /* arbitrary limit, sufficient for USB 2.0 high-bandwidth iso */
1005                         if (isopkt[u].length > 8192) {
1006                                 kfree(isopkt);
1007                                 return -EINVAL;
1008                         }
1009                         totlen += isopkt[u].length;
1010                 }
1011                 if (totlen > 32768) {
1012                         kfree(isopkt);
1013                         return -EINVAL;
1014                 }
1015                 uurb->buffer_length = totlen;
1016                 snoop(&ps->dev->dev, "iso urb\n");
1017                 break;
1018
1019         case USBDEVFS_URB_TYPE_INTERRUPT:
1020                 uurb->number_of_packets = 0;
1021                 if ((ep->desc.bmAttributes & USB_ENDPOINT_XFERTYPE_MASK)
1022                                 != USB_ENDPOINT_XFER_INT)
1023                         return -EINVAL;
1024                 if (ps->dev->speed == USB_SPEED_HIGH)
1025                         interval = 1 << min (15, ep->desc.bInterval - 1);
1026                 else
1027                         interval = ep->desc.bInterval;
1028                 if (uurb->buffer_length > MAX_USBFS_BUFFER_SIZE)
1029                         return -EINVAL;
1030                 if (!access_ok((uurb->endpoint & USB_DIR_IN) ? VERIFY_WRITE : VERIFY_READ, uurb->buffer, uurb->buffer_length))
1031                         return -EFAULT;
1032                 snoop(&ps->dev->dev, "interrupt urb\n");
1033                 break;
1034
1035         default:
1036                 return -EINVAL;
1037         }
1038         if (!(as = alloc_async(uurb->number_of_packets))) {
1039                 kfree(isopkt);
1040                 kfree(dr);
1041                 return -ENOMEM;
1042         }
1043         if (!(as->urb->transfer_buffer = kmalloc(uurb->buffer_length, GFP_KERNEL))) {
1044                 kfree(isopkt);
1045                 kfree(dr);
1046                 free_async(as);
1047                 return -ENOMEM;
1048         }
1049         as->urb->dev = ps->dev;
1050         as->urb->pipe = (uurb->type << 30) | __create_pipe(ps->dev, uurb->endpoint & 0xf) | (uurb->endpoint & USB_DIR_IN);
1051         as->urb->transfer_flags = uurb->flags;
1052         as->urb->transfer_buffer_length = uurb->buffer_length;
1053         as->urb->setup_packet = (unsigned char*)dr;
1054         as->urb->start_frame = uurb->start_frame;
1055         as->urb->number_of_packets = uurb->number_of_packets;
1056         as->urb->interval = interval;
1057         as->urb->context = as;
1058         as->urb->complete = async_completed;
1059         for (totlen = u = 0; u < uurb->number_of_packets; u++) {
1060                 as->urb->iso_frame_desc[u].offset = totlen;
1061                 as->urb->iso_frame_desc[u].length = isopkt[u].length;
1062                 totlen += isopkt[u].length;
1063         }
1064         kfree(isopkt);
1065         as->ps = ps;
1066         as->userurb = arg;
1067         if (uurb->endpoint & USB_DIR_IN)
1068                 as->userbuffer = uurb->buffer;
1069         else
1070                 as->userbuffer = NULL;
1071         as->signr = uurb->signr;
1072         as->ifnum = ifnum;
1073         as->pid = get_pid(task_pid(current));
1074         as->uid = current->uid;
1075         as->euid = current->euid;
1076         security_task_getsecid(current, &as->secid);
1077         if (!(uurb->endpoint & USB_DIR_IN)) {
1078                 if (copy_from_user(as->urb->transfer_buffer, uurb->buffer, as->urb->transfer_buffer_length)) {
1079                         free_async(as);
1080                         return -EFAULT;
1081                 }
1082         }
1083         snoop(&as->urb->dev->dev, "submit urb\n");
1084         snoop_urb(as->urb, as->userurb);
1085         async_newpending(as);
1086         if ((ret = usb_submit_urb(as->urb, GFP_KERNEL))) {
1087                 dev_printk(KERN_DEBUG, &ps->dev->dev, "usbfs: usb_submit_urb returned %d\n", ret);
1088                 async_removepending(as);
1089                 free_async(as);
1090                 return ret;
1091         }
1092         return 0;
1093 }
1094
1095 static int proc_submiturb(struct dev_state *ps, void __user *arg)
1096 {
1097         struct usbdevfs_urb uurb;
1098
1099         if (copy_from_user(&uurb, arg, sizeof(uurb)))
1100                 return -EFAULT;
1101
1102         return proc_do_submiturb(ps, &uurb, (((struct usbdevfs_urb __user *)arg)->iso_frame_desc), arg);
1103 }
1104
1105 static int proc_unlinkurb(struct dev_state *ps, void __user *arg)
1106 {
1107         struct async *as;
1108
1109         as = async_getpending(ps, arg);
1110         if (!as)
1111                 return -EINVAL;
1112         usb_kill_urb(as->urb);
1113         return 0;
1114 }
1115
1116 static int processcompl(struct async *as, void __user * __user *arg)
1117 {
1118         struct urb *urb = as->urb;
1119         struct usbdevfs_urb __user *userurb = as->userurb;
1120         void __user *addr = as->userurb;
1121         unsigned int i;
1122
1123         if (as->userbuffer)
1124                 if (copy_to_user(as->userbuffer, urb->transfer_buffer, urb->transfer_buffer_length))
1125                         return -EFAULT;
1126         if (put_user(urb->status, &userurb->status))
1127                 return -EFAULT;
1128         if (put_user(urb->actual_length, &userurb->actual_length))
1129                 return -EFAULT;
1130         if (put_user(urb->error_count, &userurb->error_count))
1131                 return -EFAULT;
1132
1133         if (usb_pipeisoc(urb->pipe)) {
1134                 for (i = 0; i < urb->number_of_packets; i++) {
1135                         if (put_user(urb->iso_frame_desc[i].actual_length,
1136                                      &userurb->iso_frame_desc[i].actual_length))
1137                                 return -EFAULT;
1138                         if (put_user(urb->iso_frame_desc[i].status,
1139                                      &userurb->iso_frame_desc[i].status))
1140                                 return -EFAULT;
1141                 }
1142         }
1143
1144         free_async(as);
1145
1146         if (put_user(addr, (void __user * __user *)arg))
1147                 return -EFAULT;
1148         return 0;
1149 }
1150
1151 static struct async* reap_as(struct dev_state *ps)
1152 {
1153         DECLARE_WAITQUEUE(wait, current);
1154         struct async *as = NULL;
1155         struct usb_device *dev = ps->dev;
1156
1157         add_wait_queue(&ps->wait, &wait);
1158         for (;;) {
1159                 __set_current_state(TASK_INTERRUPTIBLE);
1160                 if ((as = async_getcompleted(ps)))
1161                         break;
1162                 if (signal_pending(current))
1163                         break;
1164                 usb_unlock_device(dev);
1165                 schedule();
1166                 usb_lock_device(dev);
1167         }
1168         remove_wait_queue(&ps->wait, &wait);
1169         set_current_state(TASK_RUNNING);
1170         return as;
1171 }
1172
1173 static int proc_reapurb(struct dev_state *ps, void __user *arg)
1174 {
1175         struct async *as = reap_as(ps);
1176         if (as)
1177                 return processcompl(as, (void __user * __user *)arg);
1178         if (signal_pending(current))
1179                 return -EINTR;
1180         return -EIO;
1181 }
1182
1183 static int proc_reapurbnonblock(struct dev_state *ps, void __user *arg)
1184 {
1185         struct async *as;
1186
1187         if (!(as = async_getcompleted(ps)))
1188                 return -EAGAIN;
1189         return processcompl(as, (void __user * __user *)arg);
1190 }
1191
1192 #ifdef CONFIG_COMPAT
1193
1194 static int get_urb32(struct usbdevfs_urb *kurb,
1195                      struct usbdevfs_urb32 __user *uurb)
1196 {
1197         __u32  uptr;
1198         if (get_user(kurb->type, &uurb->type) ||
1199             __get_user(kurb->endpoint, &uurb->endpoint) ||
1200             __get_user(kurb->status, &uurb->status) ||
1201             __get_user(kurb->flags, &uurb->flags) ||
1202             __get_user(kurb->buffer_length, &uurb->buffer_length) ||
1203             __get_user(kurb->actual_length, &uurb->actual_length) ||
1204             __get_user(kurb->start_frame, &uurb->start_frame) ||
1205             __get_user(kurb->number_of_packets, &uurb->number_of_packets) ||
1206             __get_user(kurb->error_count, &uurb->error_count) ||
1207             __get_user(kurb->signr, &uurb->signr))
1208                 return -EFAULT;
1209
1210         if (__get_user(uptr, &uurb->buffer))
1211                 return -EFAULT;
1212         kurb->buffer = compat_ptr(uptr);
1213         if (__get_user(uptr, &uurb->buffer))
1214                 return -EFAULT;
1215         kurb->usercontext = compat_ptr(uptr);
1216
1217         return 0;
1218 }
1219
1220 static int proc_submiturb_compat(struct dev_state *ps, void __user *arg)
1221 {
1222         struct usbdevfs_urb uurb;
1223
1224         if (get_urb32(&uurb,(struct usbdevfs_urb32 __user *)arg))
1225                 return -EFAULT;
1226
1227         return proc_do_submiturb(ps, &uurb, ((struct usbdevfs_urb32 __user *)arg)->iso_frame_desc, arg);
1228 }
1229
1230 static int processcompl_compat(struct async *as, void __user * __user *arg)
1231 {
1232         struct urb *urb = as->urb;
1233         struct usbdevfs_urb32 __user *userurb = as->userurb;
1234         void __user *addr = as->userurb;
1235         unsigned int i;
1236
1237         if (as->userbuffer)
1238                 if (copy_to_user(as->userbuffer, urb->transfer_buffer, urb->transfer_buffer_length))
1239                         return -EFAULT;
1240         if (put_user(urb->status, &userurb->status))
1241                 return -EFAULT;
1242         if (put_user(urb->actual_length, &userurb->actual_length))
1243                 return -EFAULT;
1244         if (put_user(urb->error_count, &userurb->error_count))
1245                 return -EFAULT;
1246
1247         if (usb_pipeisoc(urb->pipe)) {
1248                 for (i = 0; i < urb->number_of_packets; i++) {
1249                         if (put_user(urb->iso_frame_desc[i].actual_length,
1250                                      &userurb->iso_frame_desc[i].actual_length))
1251                                 return -EFAULT;
1252                         if (put_user(urb->iso_frame_desc[i].status,
1253                                      &userurb->iso_frame_desc[i].status))
1254                                 return -EFAULT;
1255                 }
1256         }
1257
1258         free_async(as);
1259         if (put_user(ptr_to_compat(addr), (u32 __user *)arg))
1260                 return -EFAULT;
1261         return 0;
1262 }
1263
1264 static int proc_reapurb_compat(struct dev_state *ps, void __user *arg)
1265 {
1266         struct async *as = reap_as(ps);
1267         if (as)
1268                 return processcompl_compat(as, (void __user * __user *)arg);
1269         if (signal_pending(current))
1270                 return -EINTR;
1271         return -EIO;
1272 }
1273
1274 static int proc_reapurbnonblock_compat(struct dev_state *ps, void __user *arg)
1275 {
1276         struct async *as;
1277
1278         if (!(as = async_getcompleted(ps)))
1279                 return -EAGAIN;
1280         return processcompl_compat(as, (void __user * __user *)arg);
1281 }
1282
1283 #endif
1284
1285 static int proc_disconnectsignal(struct dev_state *ps, void __user *arg)
1286 {
1287         struct usbdevfs_disconnectsignal ds;
1288
1289         if (copy_from_user(&ds, arg, sizeof(ds)))
1290                 return -EFAULT;
1291         if (ds.signr != 0 && (ds.signr < SIGRTMIN || ds.signr > SIGRTMAX))
1292                 return -EINVAL;
1293         ps->discsignr = ds.signr;
1294         ps->disccontext = ds.context;
1295         return 0;
1296 }
1297
1298 static int proc_claiminterface(struct dev_state *ps, void __user *arg)
1299 {
1300         unsigned int ifnum;
1301
1302         if (get_user(ifnum, (unsigned int __user *)arg))
1303                 return -EFAULT;
1304         return claimintf(ps, ifnum);
1305 }
1306
1307 static int proc_releaseinterface(struct dev_state *ps, void __user *arg)
1308 {
1309         unsigned int ifnum;
1310         int ret;
1311
1312         if (get_user(ifnum, (unsigned int __user *)arg))
1313                 return -EFAULT;
1314         if ((ret = releaseintf(ps, ifnum)) < 0)
1315                 return ret;
1316         destroy_async_on_interface (ps, ifnum);
1317         return 0;
1318 }
1319
1320 static int proc_ioctl(struct dev_state *ps, struct usbdevfs_ioctl *ctl)
1321 {
1322         int                     size;
1323         void                    *buf = NULL;
1324         int                     retval = 0;
1325         struct usb_interface    *intf = NULL;
1326         struct usb_driver       *driver = NULL;
1327
1328         /* alloc buffer */
1329         if ((size = _IOC_SIZE (ctl->ioctl_code)) > 0) {
1330                 if ((buf = kmalloc (size, GFP_KERNEL)) == NULL)
1331                         return -ENOMEM;
1332                 if ((_IOC_DIR(ctl->ioctl_code) & _IOC_WRITE)) {
1333                         if (copy_from_user (buf, ctl->data, size)) {
1334                                 kfree(buf);
1335                                 return -EFAULT;
1336                         }
1337                 } else {
1338                         memset (buf, 0, size);
1339                 }
1340         }
1341
1342         if (!connected(ps)) {
1343                 kfree(buf);
1344                 return -ENODEV;
1345         }
1346
1347         if (ps->dev->state != USB_STATE_CONFIGURED)
1348                 retval = -EHOSTUNREACH;
1349         else if (!(intf = usb_ifnum_to_if (ps->dev, ctl->ifno)))
1350                retval = -EINVAL;
1351         else switch (ctl->ioctl_code) {
1352
1353         /* disconnect kernel driver from interface */
1354         case USBDEVFS_DISCONNECT:
1355
1356                 down_write(&usb_bus_type.subsys.rwsem);
1357                 if (intf->dev.driver) {
1358                         driver = to_usb_driver(intf->dev.driver);
1359                         dev_dbg (&intf->dev, "disconnect by usbfs\n");
1360                         usb_driver_release_interface(driver, intf);
1361                 } else
1362                         retval = -ENODATA;
1363                 up_write(&usb_bus_type.subsys.rwsem);
1364                 break;
1365
1366         /* let kernel drivers try to (re)bind to the interface */
1367         case USBDEVFS_CONNECT:
1368                 usb_unlock_device(ps->dev);
1369                 retval = bus_rescan_devices(intf->dev.bus);
1370                 usb_lock_device(ps->dev);
1371                 break;
1372
1373         /* talk directly to the interface's driver */
1374         default:
1375                 down_read(&usb_bus_type.subsys.rwsem);
1376                 if (intf->dev.driver)
1377                         driver = to_usb_driver(intf->dev.driver);
1378                 if (driver == NULL || driver->ioctl == NULL) {
1379                         retval = -ENOTTY;
1380                 } else {
1381                         retval = driver->ioctl (intf, ctl->ioctl_code, buf);
1382                         if (retval == -ENOIOCTLCMD)
1383                                 retval = -ENOTTY;
1384                 }
1385                 up_read(&usb_bus_type.subsys.rwsem);
1386         }
1387
1388         /* cleanup and return */
1389         if (retval >= 0
1390                         && (_IOC_DIR (ctl->ioctl_code) & _IOC_READ) != 0
1391                         && size > 0
1392                         && copy_to_user (ctl->data, buf, size) != 0)
1393                 retval = -EFAULT;
1394
1395         kfree(buf);
1396         return retval;
1397 }
1398
1399 static int proc_ioctl_default(struct dev_state *ps, void __user *arg)
1400 {
1401         struct usbdevfs_ioctl   ctrl;
1402
1403         if (copy_from_user(&ctrl, arg, sizeof (ctrl)))
1404                 return -EFAULT;
1405         return proc_ioctl(ps, &ctrl);
1406 }
1407
1408 #ifdef CONFIG_COMPAT
1409 static int proc_ioctl_compat(struct dev_state *ps, compat_uptr_t arg)
1410 {
1411         struct usbdevfs_ioctl32 __user *uioc;
1412         struct usbdevfs_ioctl ctrl;
1413         u32 udata;
1414
1415         uioc = compat_ptr((long)arg);
1416         if (get_user(ctrl.ifno, &uioc->ifno) ||
1417             get_user(ctrl.ioctl_code, &uioc->ioctl_code) ||
1418             __get_user(udata, &uioc->data))
1419                 return -EFAULT;
1420         ctrl.data = compat_ptr(udata);
1421
1422         return proc_ioctl(ps, &ctrl);
1423 }
1424 #endif
1425
1426 /*
1427  * NOTE:  All requests here that have interface numbers as parameters
1428  * are assuming that somehow the configuration has been prevented from
1429  * changing.  But there's no mechanism to ensure that...
1430  */
1431 static int usbdev_ioctl(struct inode *inode, struct file *file, unsigned int cmd, unsigned long arg)
1432 {
1433         struct dev_state *ps = file->private_data;
1434         struct usb_device *dev = ps->dev;
1435         void __user *p = (void __user *)arg;
1436         int ret = -ENOTTY;
1437
1438         if (!(file->f_mode & FMODE_WRITE))
1439                 return -EPERM;
1440         usb_lock_device(dev);
1441         if (!connected(ps)) {
1442                 usb_unlock_device(dev);
1443                 return -ENODEV;
1444         }
1445
1446         switch (cmd) {
1447         case USBDEVFS_CONTROL:
1448                 snoop(&dev->dev, "%s: CONTROL\n", __FUNCTION__);
1449                 ret = proc_control(ps, p);
1450                 if (ret >= 0)
1451                         inode->i_mtime = CURRENT_TIME;
1452                 break;
1453
1454         case USBDEVFS_BULK:
1455                 snoop(&dev->dev, "%s: BULK\n", __FUNCTION__);
1456                 ret = proc_bulk(ps, p);
1457                 if (ret >= 0)
1458                         inode->i_mtime = CURRENT_TIME;
1459                 break;
1460
1461         case USBDEVFS_RESETEP:
1462                 snoop(&dev->dev, "%s: RESETEP\n", __FUNCTION__);
1463                 ret = proc_resetep(ps, p);
1464                 if (ret >= 0)
1465                         inode->i_mtime = CURRENT_TIME;
1466                 break;
1467
1468         case USBDEVFS_RESET:
1469                 snoop(&dev->dev, "%s: RESET\n", __FUNCTION__);
1470                 ret = proc_resetdevice(ps);
1471                 break;
1472
1473         case USBDEVFS_CLEAR_HALT:
1474                 snoop(&dev->dev, "%s: CLEAR_HALT\n", __FUNCTION__);
1475                 ret = proc_clearhalt(ps, p);
1476                 if (ret >= 0)
1477                         inode->i_mtime = CURRENT_TIME;
1478                 break;
1479
1480         case USBDEVFS_GETDRIVER:
1481                 snoop(&dev->dev, "%s: GETDRIVER\n", __FUNCTION__);
1482                 ret = proc_getdriver(ps, p);
1483                 break;
1484
1485         case USBDEVFS_CONNECTINFO:
1486                 snoop(&dev->dev, "%s: CONNECTINFO\n", __FUNCTION__);
1487                 ret = proc_connectinfo(ps, p);
1488                 break;
1489
1490         case USBDEVFS_SETINTERFACE:
1491                 snoop(&dev->dev, "%s: SETINTERFACE\n", __FUNCTION__);
1492                 ret = proc_setintf(ps, p);
1493                 break;
1494
1495         case USBDEVFS_SETCONFIGURATION:
1496                 snoop(&dev->dev, "%s: SETCONFIGURATION\n", __FUNCTION__);
1497                 ret = proc_setconfig(ps, p);
1498                 break;
1499
1500         case USBDEVFS_SUBMITURB:
1501                 snoop(&dev->dev, "%s: SUBMITURB\n", __FUNCTION__);
1502                 ret = proc_submiturb(ps, p);
1503                 if (ret >= 0)
1504                         inode->i_mtime = CURRENT_TIME;
1505                 break;
1506
1507 #ifdef CONFIG_COMPAT
1508
1509         case USBDEVFS_SUBMITURB32:
1510                 snoop(&dev->dev, "%s: SUBMITURB32\n", __FUNCTION__);
1511                 ret = proc_submiturb_compat(ps, p);
1512                 if (ret >= 0)
1513                         inode->i_mtime = CURRENT_TIME;
1514                 break;
1515
1516         case USBDEVFS_REAPURB32:
1517                 snoop(&dev->dev, "%s: REAPURB32\n", __FUNCTION__);
1518                 ret = proc_reapurb_compat(ps, p);
1519                 break;
1520
1521         case USBDEVFS_REAPURBNDELAY32:
1522                 snoop(&dev->dev, "%s: REAPURBDELAY32\n", __FUNCTION__);
1523                 ret = proc_reapurbnonblock_compat(ps, p);
1524                 break;
1525
1526         case USBDEVFS_IOCTL32:
1527                 snoop(&dev->dev, "%s: IOCTL\n", __FUNCTION__);
1528                 ret = proc_ioctl_compat(ps, ptr_to_compat(p));
1529                 break;
1530 #endif
1531
1532         case USBDEVFS_DISCARDURB:
1533                 snoop(&dev->dev, "%s: DISCARDURB\n", __FUNCTION__);
1534                 ret = proc_unlinkurb(ps, p);
1535                 break;
1536
1537         case USBDEVFS_REAPURB:
1538                 snoop(&dev->dev, "%s: REAPURB\n", __FUNCTION__);
1539                 ret = proc_reapurb(ps, p);
1540                 break;
1541
1542         case USBDEVFS_REAPURBNDELAY:
1543                 snoop(&dev->dev, "%s: REAPURBDELAY\n", __FUNCTION__);
1544                 ret = proc_reapurbnonblock(ps, p);
1545                 break;
1546
1547         case USBDEVFS_DISCSIGNAL:
1548                 snoop(&dev->dev, "%s: DISCSIGNAL\n", __FUNCTION__);
1549                 ret = proc_disconnectsignal(ps, p);
1550                 break;
1551
1552         case USBDEVFS_CLAIMINTERFACE:
1553                 snoop(&dev->dev, "%s: CLAIMINTERFACE\n", __FUNCTION__);
1554                 ret = proc_claiminterface(ps, p);
1555                 break;
1556
1557         case USBDEVFS_RELEASEINTERFACE:
1558                 snoop(&dev->dev, "%s: RELEASEINTERFACE\n", __FUNCTION__);
1559                 ret = proc_releaseinterface(ps, p);
1560                 break;
1561
1562         case USBDEVFS_IOCTL:
1563                 snoop(&dev->dev, "%s: IOCTL\n", __FUNCTION__);
1564                 ret = proc_ioctl_default(ps, p);
1565                 break;
1566         }
1567         usb_unlock_device(dev);
1568         if (ret >= 0)
1569                 inode->i_atime = CURRENT_TIME;
1570         return ret;
1571 }
1572
1573 /* No kernel lock - fine */
1574 static unsigned int usbdev_poll(struct file *file, struct poll_table_struct *wait)
1575 {
1576         struct dev_state *ps = file->private_data;
1577         unsigned int mask = 0;
1578
1579         poll_wait(file, &ps->wait, wait);
1580         if (file->f_mode & FMODE_WRITE && !list_empty(&ps->async_completed))
1581                 mask |= POLLOUT | POLLWRNORM;
1582         if (!connected(ps))
1583                 mask |= POLLERR | POLLHUP;
1584         return mask;
1585 }
1586
1587 const struct file_operations usbfs_device_file_operations = {
1588         .llseek =       usbdev_lseek,
1589         .read =         usbdev_read,
1590         .poll =         usbdev_poll,
1591         .ioctl =        usbdev_ioctl,
1592         .open =         usbdev_open,
1593         .release =      usbdev_release,
1594 };
1595
1596 static int usbdev_add(struct usb_device *dev)
1597 {
1598         int minor = ((dev->bus->busnum-1) * 128) + (dev->devnum-1);
1599
1600         dev->usbfs_dev = device_create(usb_device_class, &dev->dev,
1601                                 MKDEV(USB_DEVICE_MAJOR, minor),
1602                                 "usbdev%d.%d", dev->bus->busnum, dev->devnum);
1603         if (IS_ERR(dev->usbfs_dev))
1604                 return PTR_ERR(dev->usbfs_dev);
1605
1606         dev->usbfs_dev->platform_data = dev;
1607         return 0;
1608 }
1609
1610 static void usbdev_remove(struct usb_device *dev)
1611 {
1612         device_unregister(dev->usbfs_dev);
1613 }
1614
1615 static int usbdev_notify(struct notifier_block *self, unsigned long action,
1616                          void *dev)
1617 {
1618         switch (action) {
1619         case USB_DEVICE_ADD:
1620                 if (usbdev_add(dev))
1621                         return NOTIFY_BAD;
1622                 break;
1623         case USB_DEVICE_REMOVE:
1624                 usbdev_remove(dev);
1625                 break;
1626         }
1627         return NOTIFY_OK;
1628 }
1629
1630 static struct notifier_block usbdev_nb = {
1631         .notifier_call =        usbdev_notify,
1632 };
1633
1634 static struct cdev usb_device_cdev = {
1635         .kobj   = {.name = "usb_device", },
1636         .owner  = THIS_MODULE,
1637 };
1638
1639 int __init usbdev_init(void)
1640 {
1641         int retval;
1642
1643         retval = register_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX,
1644                         "usb_device");
1645         if (retval) {
1646                 err("unable to register minors for usb_device");
1647                 goto out;
1648         }
1649         cdev_init(&usb_device_cdev, &usbfs_device_file_operations);
1650         retval = cdev_add(&usb_device_cdev, USB_DEVICE_DEV, USB_DEVICE_MAX);
1651         if (retval) {
1652                 err("unable to get usb_device major %d", USB_DEVICE_MAJOR);
1653                 goto error_cdev;
1654         }
1655         usb_device_class = class_create(THIS_MODULE, "usb_device");
1656         if (IS_ERR(usb_device_class)) {
1657                 err("unable to register usb_device class");
1658                 retval = PTR_ERR(usb_device_class);
1659                 goto error_class;
1660         }
1661
1662         usb_register_notify(&usbdev_nb);
1663
1664 out:
1665         return retval;
1666
1667 error_class:
1668         usb_device_class = NULL;
1669         cdev_del(&usb_device_cdev);
1670
1671 error_cdev:
1672         unregister_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX);
1673         goto out;
1674 }
1675
1676 void usbdev_cleanup(void)
1677 {
1678         usb_unregister_notify(&usbdev_nb);
1679         class_destroy(usb_device_class);
1680         cdev_del(&usb_device_cdev);
1681         unregister_chrdev_region(USB_DEVICE_DEV, USB_DEVICE_MAX);
1682 }
1683